Euler NetoInvestigating Phishing with OSINTWhen we are investigating a Phishing attack, it can happen that the malicious link inside of it is currently unavailable. But, fortunatelly…Jun 26Jun 26
Euler Neto[Malware Studies] PhenakiteSince my last malware analysis post was about an Android malware, I’ve decided to start to analyze malwares that target iOS devices. This…Jun 15Jun 15
Euler Neto(2023) My year in cybersecurity booksIncident Response with Threat Intelligence - Roberto MartinezDec 25, 2023Dec 25, 2023
Euler Neto[Malware Studies] VikingHordeIt’s been a long time but I decided to write another analysis of a binary obtained in theZoo. This time it’s about an Android application.Nov 15, 2023Nov 15, 2023
Euler NetoUsing the different kinds of strings in Yara rulesIf you are into cybersecurity and are passionate about ares like Malware Analys or Detection Engineering, you problaby know about Yara…Jul 26, 2023Jul 26, 2023
Euler Neto(2022) My year in cybersecurity booksPractical Social Engineering: A Primer for the Ethical Hacker - Joe GrayJan 11, 2023Jan 11, 2023
Euler Neto[Malware Studies] LockyIn my second text about Malware Studies, this time I’ll show the analysis made in Locky Ransomware. Like the previous post, this executable…Dec 1, 2022Dec 1, 2022
Euler Neto[Malware Studies] CerberI’m been focusing my studies in Reverse Engineering and Malware Analysis. The approach that I’m following is downloading the theZoo’s…Aug 20, 2022Aug 20, 2022
Euler NetoSolving Step 2 of Downtown Murderer without using reverse image search — HacktoriaHacktoria’s monthly CTF in May was Downtown Murderer. There were 6 steps and I will focus in Step 2, which consists in geolocate three…Jun 3, 2022Jun 3, 2022
Euler Neto[Write-up] LetsDefend — Suspicious Mshta BehaviorFor those who don’t know, LetsDefend is a plataform where, among other things, simulates a SOC and there are some alerts to be resolved…Apr 6, 2022Apr 6, 2022